Tiger Hash Attribute Encryption for Secured Cloud Service Provisioning
Total Page:16
File Type:pdf, Size:1020Kb
Middle-East Journal of Scientific Research 25 (1): 181-191, 2017 ISSN 1990-9233 © IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.181.191 Tiger Hash Attribute Encryption for Secured Cloud Service Provisioning 12P. Muthusamy and V. Murali Bhaskaran 1Department of Computer Science & Engg, Anna University, Chennai - 600 025, Tamil Nadu, India 2Principal, Dhirajlal Gandhi College of Technology, Salem - 636 309, Tamil Nadu, India Abstract: Cloud Computing facilitates organization to share various operation services in a high secure manner. In cloud based communication, the confidentiality of the systemis the major concern. Hence, the secured message communication is to prevent unauthorized access of confidential information. Several encryption approacheshave been developed for cloud service provisioning. But, cloud users still have major security and confidentiality about their outsourced data due to unauthorized access within the service providers. In order to improve the confidentiality in cloud service provisioning, Tiger Cryptographic Hash Function based Attribute Encryption and Decryption (TCHF-AED) technique is introduced. Tiger is a cryptographic hash function for achieving higher confidentiality rate in cloud service provisioning. Initially, the attribute cloud request is sent from the users to cloud server. Next, Tiger Cryptographic Hash Function is used to achieve cloud data confidentiality based on output of hash value.TheAttribute Encryption is performed for converting actual message into cipher textand the hash value of each encrypted message is calculated. The encrypted message with hash value is stored in cloud server. Whenever the cloud user accesses the data from cloud server, the hash value is recomputed to achieve the correctness of the message. If the correctness is achieved the decryption is performed to attain the confidentiality. The Attribute Decryption is carried out to decrypt the cipher text and achievean original message. This helps to improve the confidentiality rate and reduces the communication overhead. Experimental results shows that the proposed TCHF-AED technique achieves better performance in terms of Communication overhead, encryption time, memory consumption and confidentiality rate compared to the state-of-the-art works. Key words: Cloud service provisioning Cloud users Tiger Cryptographic Hash Function Attribute Encryption Attribute Decryption Cipher text INTRODUCTION Cloud computing is a one of the Internet-based computing that offers services to computer and other cloud devices. The most significant concern is a security in cloud implementation. The confidentiality based communication between the cloud user and service provider is essential in secured data communication. Confidentiality refers to maintenance data privacy. In cloud computing, the users send the request to server and Fig. 1: Block diagram of data communication in cloud it response the user requested data. During data communication, security is the major role in service Figure 1 illustrates the block diagram of cloud data provisioning in order to achieve the higher confidentiality. communication. The cloud user sends the request to The basic diagram of the message communication cloud server. The third- party auditor is a partially trusted between clients and server is shown in Figure 1. and independent entity that can provide access and Corresponding Author: P. Muthusamy, Research Scholar, Department of Computer Science & Engg., Anna University, Chennai - 600 025, Tamil Nadu, India. 181 Middle-East J. Sci. Res., 25 (1): 181-191, 2017 mediation if essential. The cloud users interact with cloud To improve the security in cloud service server for accessing secured communication. provisioning, Tiger Cryptographic Hash Function Confidentiality is also maintained by technical tools such based Attribute Encryption and Decryption (TCHF- as encryption, access control and authorized security. AED) technique is introduced Therefore, the various encryption techniques were In order to convert the original message into cipher developed for secure communication. A Key-policy text, Attribute Encryption is performed by checking attribute-based encryption (KP-ABE) was introduced in the authorization cloud data owner and cloud data [1] which allows senders to encrypt messages based on requester. a set of attributes. However, security and confidentiality In order to improve confidentiality, the correctness of about their outsourced data are not yet improved. the data is measured using the hash value Mediated certificate less public key encryption Finally, the TCHF-AED technique performs dynamic (mCL-PKE) was introduced in [2] to resolve the key attribute decryption whenever a cloud user requests escrow difficulty in identity based encryption and for the corresponding message with the help of certificate revocation. While handling multiple users, the secret key. overall overhead is increased. An attribute-based secure data sharing method was The rest of the paper is structured as follows: In introduced in [3] with Efficient revocation (EABDS) in Section 2, Tiger Cryptographic Hash Function based cloud computing using symmetric key encryption which Attribute Encryption and Decryption (TCHF-AED) improves the data confidentiality. A novel encrypting technique is described with neat diagram. In Section 3, algorithm based on symmetric key cryptographic experimental settings are provided with the analysis of framework was introduced in [4]. However, it reduced the results explained in Section 4. In Section 5, introduces the reliability of the encryption. Secure Service Provisioning related works. The conclusion of the research work is architecture was designed in [5] for Cyber Physical Cloud presented in section 6. Computing Systems provided as service provisioning sub systems. Though, the system confidentiality is remained Tiger Cryptographic Hash Function Based Attribute unaddressed. A smart card generator (SCG) was Encryption and Decryption: Tiger cryptographic hash introduced in [6] for decreasing the authentication function is used for improving the security in cloud processing time used by message communication service provisioning. In cryptography, Tiger is a one of between cloud service providers and users. A secure the cryptographic hash function which has effectiveness mobile Web service framework was designed in [7] for on 64-bit platforms. The tiger hash value size is secure and private mobile cloud in order to provide the characterized as 192 bits. Hence, the size of the tiger hash Web services and improves the service performance. value is adaptability for improving the security in cloud A Comprehensive Transmission (CT) model was service provisioning. Tiger is a modification where the introduced in [8] by combining the Client/Server (C/S) message is protected by first adding a byte with the mode and the Peer-to-Peer (P2P) mode for reliable data hexadecimal value of 0x01 with the use of Tiger hash transmission and secure services in cloud computing. function. Tiger is mostly used in the structure of Merkle An Elliptic Curve Cryptography (ECC) technique was hash tree, where it is specified as TTH (Tiger Tree Hash). introduced in [9] provides solutions for secured Cloud TTH is utilized by several clients on the data environment. Though, the technique failed to consider the communication networks. Based on the above confidence measure in both large and small scale specification, the tiger hash function is constructed in organization. Global Authentication Register System order to achieve confidentiality in message (GARS) was developed in [10] to decrease cloud material communication. Due to rapid growth of transaction risk and improve the security and performance. The issues processing in cloud, maintaining the security level in presented in the existing literature such as lesser service provisioning is a significant to hide the original reliability, higher overhead, lack of confidence measure. In message. Therefore, the security is enhanced using Tiger order to address such kind of issues, an efficient Tiger Cryptographic Hash Function based Attribute Encryption Cryptographic Hash Function based Attribute Encryption and Decryption (TCHF-AED) technique. The TCHF-AED and Decryption (TCHF-AED) technique is developed in technique provides high secure message communication cloud service provisioning. across different attributes. The communication is The objective of the research work is described as performed effectively in TCHF-AED technique on cloud follows, data storage system by different users through various 182 Middle-East J. Sci. Res., 25 (1): 181-191, 2017 Tiger Cryptographic Hash Function: Tiger is a cryptographic hash function structured by the universal Merkle-Damgard paradigm. This is the one-way compression function which functioned on 64-bit architecture. The Tiger hash function is operated based on universal Merkle-Damgard hash function. The 64-bit words, managing 3 words of state and processing 9 words of data is functioned by the compression function. There are 27 rounds using a combination of operation with XOR, addition/subtraction, rotations, s box lookups and a comparatively complex key scheduling algorithm for developing 27 round keys from the 9 input words. The 512 bit input fetches 192 bit hash value in tiger hashing process. The resultant hash value has high confidence. Tiger/128 and Tiger/160 constructs a hash Fig. 2: Architecture diagram of the Tiger Cryptographic length of 128 and 160 bits, correspondingly,